From Pentestmonkey.net, this is a great list of SQL Injection cheat sheets.
Some more Links:
This is our place on the Internet.
Tags:access, attack, Authorisation, bank, Banking, Banking and EFTPoS, Card, card schemes, card skimming, certificate registration, Commerce, Corporate, Credit, customer recognition, CVV, data, Debit, disaster recovery, EFT, encryption, hardware, identification, Ingres, international fraud, Internet, ISP, Merchant, merchant customers, money, network, partner relationships, payment, payment clearance, privacy, processing, registration management, reporting, security, server, service level agreements, settlement, Shiraz, Skimmer, SLA, smart card, support, SWIFT, TCPIP, telegraphic transfer, VISA, web
EFT devices and systems differ depending on hardware vendor, country and bank / payment aggregator.
Below is a list of things you may like to consider. This list is off the top of my head so it is probably not complete.
Looking at the products and relationships us usually a good start.
Things to consider:
Category: Banking & EFTPoS
Recently I came across a new e-Commerce company called EFT Networks, which seems to have an exciting future in the Global Payments Market.
It looks like they have a good mix of consulting and solution design.
Designed to enable both credit card and direct debit, EFT Networks electronic payment solutions work effectively across multiple sales channelsâ€”including Web, Contact Call Centre, IVR and EFTPOS. Manage your payment processing system in-house or outsource, depending on your business needs.
International commerce requires fully integrated global payment and risk management solutions. Requirements span the gamut of payment acceptance considerations from accepting local payment types, pricing in local currencies and dynamically updating prices with changes in exchange rates (dynamic currency conversion), authorising and settling in multiple currencies, to managing fraud and compliance issues such as tax and export regulations. EFT Networks offers a single interface to the global payment network to handle all of these considerations as your business grows.
The EFT Networks Enterprise Business Center gives you a single, easy-to-use interface for managing and configuring payment processing services.
ICE caters for each area of the payment transaction cycle from authentication, authorisation, settlement, dispute resolution and reconciliation â€“ enabling our clients to reduce transaction costs, eliminate fraud, minimise risk, maximise cash flow and increase profitability.
EFT Networks provides flexible and secure payment and risk management integrations in to host and legacy systems as well as industry-leading software.
Using industry standards and protocols, our solutions can be customised to suit your exact business requirements
At the core is our Intelligent Communications Exchange (ICE) which enables all known transaction enablers from EFTPOS to eCommerce to be routed directly to a clientâ€™s bank without intervention for real time acceptance and authentication.
The EFT Networks ICE operates under a philosophy of total System and Physical redundancy delivering the highest uptime rates possible, whilst the transaction network is protected using Solid State and Application Firewalls on all points of ingress and egress.
Every transaction processed through EFT Networks is encrypted using 128 bit Secure Socket Layer (SSL) encryption and submitted for authorisation through EFT Networks â€œSecure Virtual Private Networkâ€ (SVPN).
Our commitment to security is also reflected in our swift compliance with Card Schemes security initiatives such as VerifiedByVisa and MasterCard SecureCode.
EFT Networks comprehensive suit of online reporting tools combined with daily transaction reports will ensure that our clients always have access to up-to-date management information allowing Business Managers to make quick and well-informed business decisions. The decision making process is simplified even further with the power of daily reports that are customised to be imported into most existing legacy systems.